Building your comprehensive cloud security checklist

Leading up to AWS re:Invent 2013, I have been blogging about a hot topic – what should be on your cloud security checklist to cover off your security responsibilities when deploying in the cloud. To date, I have covered operating system and network security, data and application security, as well as the key optimizations to ensure security becomes part of your cloud architecture and operations (not a hindrance).

The final piece of the checklist – flexible options to buy and deploy

As I know you are all very well aware of, a great security solution will not only be able to address technical and operational requirements, it will also align to your buying and deployment preferences.

Here are some of the comments we have heard from customers about security solutions focused on their responsibilities on AWS deployments:

“If I prefer to buy service offerings vs. software, I want the same for security.”

“I’m used to a pay-as-you-go model, billed on a monthly basis for my AWS environment. I want the same for security.”

With the show in full swing, I hope you are having as great a time as I am! I am really enjoying hearing all the innovative uses of cloud environments and have had some fantastic discussions on how to architect with security in mind.

I hope to meet you at the show – drop by our booth (#607), or join in our sessions TrendMicro.com/AWS – I would love to chat more about how Trend Micro can help you meet your security responsibilities in the cloud. I also encourage you to join our Twitter chat tomorrow at 1 p.m. PST with any questions you have regarding AWS using the hashtag #TrendTalk.